Author of the publication

Efficient Privacy-Preserving Association Rule Mining: P4P Style.

, , and . CIDM, page 654-660. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking the Data Barrier: Towards Robust Speech Translation via Adversarial Stability Training., , , , and . IWSLT, Association for Computational Linguistics, (2019)Efficient Privacy-Preserving Association Rule Mining: P4P Style., , and . CIDM, page 654-660. IEEE, (2007)Privacy Preserving Link Analysis on Dynamic Weighted Graph., , , and . Comput. Math. Organ. Theory, 11 (2): 141-159 (2005)How to deal with malicious users in privacy-preserving distributed data mining., and . Stat. Anal. Data Min., 2 (1): 18-33 (2009)Practical private computation of vector addition-based functions., and . PODC, page 326-327. ACM, (2007)Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy.. CCSW, page 57-68. ACM, (2014)Youdao's Winning Solution to the NLPCC-2018 Task 2 Challenge: A Neural Machine Translation Approach to Chinese Grammatical Error Correction., , and . NLPCC (1), volume 11108 of Lecture Notes in Computer Science, page 341-350. Springer, (2018)A Paradigm Shift: The Future of Machine Translation Lies with Large Language Models., , , , , , , , and . LREC/COLING, page 1339-1352. ELRA and ICCL, (2024)Zero-knowledge test of vector equivalence granulation of user data with privacy., and . GrC, page 720-725. IEEE, (2006)E-Commerce Item Recommendation Based on Field-aware Factorization Machine., , and . RecSys Challenge, page 2:1-2:4. ACM, (2015)